Protect.Computer
NEWS

Cisco IMC auth bypass (CVE-2026-20093) can let attackers take admin control

· 1 min read · Network safety Device safety

What happened

Cisco released fixes for a critical vulnerability in Cisco Integrated Management Controller (IMC), tracked as CVE-2026-20093. IMC is the out-of-band management interface used on many UCS servers.

According to Cisco, the bug is caused by incorrect handling of password-change requests. A remote attacker who can reach the IMC web interface could send a crafted request to bypass authentication, change user passwords (including admin), and then log in as that user.

Why this matters

IMC is a high-value target because it controls server management even when the operating system is down. If attackers gain IMC admin access, they can potentially alter configuration, disrupt operations, and pivot deeper into internal infrastructure.

How to check if you’re affected

You may be affected if you run Cisco UCS systems with exposed or reachable IMC interfaces and have not applied Cisco’s fixed software.

  1. Identify Cisco UCS C-Series/E-Series servers that use IMC/CIMC.
  2. Check installed IMC firmware/software versions against Cisco’s fixed-version matrix in the advisory.
  3. Verify whether IMC management interfaces are reachable from untrusted networks.
  4. Review recent IMC account-password changes and admin logins for anomalies.
  5. Apply Cisco’s patched release immediately; Cisco says there are no workarounds for this issue.

Immediate defensive actions

  • Restrict IMC access to dedicated management networks/VPN only.
  • Block public internet exposure of IMC web/API endpoints.
  • Rotate IMC administrative credentials after patching.
  • Enable and retain IMC audit logs for incident review.

Sources

Bottom line

If your organization runs Cisco UCS servers, treat IMC patching for CVE-2026-20093 as urgent and lock management-plane exposure down immediately.

Related reading